<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Christina Goggi</title>
	<atom:link href="http://www.gfi.com/blog/author/christina-goggi/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Are You Ready for 2014? GFI LanGuard® 2014 Is!</title>
		<link>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-ready-for-2014-gfi-languard-2014-is</link>
		<comments>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/#comments</comments>
		<pubDate>Tue, 10 Sep 2013 11:14:13 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[GFI LanGuard 2014]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[network administrators]]></category>
		<category><![CDATA[Operating Systems]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[vulnerability assessment]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10851</guid>
		<description><![CDATA[We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&#38;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release. Q: How is GFI LanGuard adapting to the changes that &#8230;]]></description>
				<content:encoded><![CDATA[<p><i><br />
We’re very happy to announce GFI LanGuard 2014 has been launched today! In this Q&amp;A interview, Cristian Florian, Product Manager for GFI LanGuard, talks about what’s new in this release.<span id="more-10851"></span></i></p>
<h2><b>Q: How is GFI LanGuard adapting to the changes that happen so fast in the IT infrastructure landscape nowadays?</b></h2>
<div id="attachment_10852" class="wp-caption alignright" style="width: 317px"><a style="color: #ff4b33;" href="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg"><img class="wp-image-10852 " alt="Cristian Florian" src="http://www.gfi.com/blog/wp-content/uploads/2013/09/Cristian-Florian.jpg" width="307" height="197" /></a><p class="wp-caption-text">Cristian Florian, Product Manager for GFI LanGuard</p></div>
<p>IT environments now include so many different devices, operating systems and applications that network administrators may not even be aware of all of them. The rise in BYOD (Bring Your Own Device) in business environments has added to the burden system administrators have to carry every day, in turn forcing them to stay on top of their network environment, strengthen security, while also monitoring an ever-changing network infrastructure.</p>
<p>So we built GFI LanGuard 2014 with this in mind. We had to extend its capability in this new environment because the whole IT infrastructure needs to be managed, no matter if we are talking about Windows®, Mac OS® or Linux® systems, physical or virtual machines, servers, desktops, laptops, mobile devices such as smartphones and tablets, or network devices such as routers, switches and printers.</p>
<h2><b>Q: What is new in GFI LanGuard 2014?</b></h2>
<p>One of the major things we added in GFI LanGuard 2014 is vulnerability assessment for smartphones and tablets. According to a <a href="http://www.ciscomcon.com/sw/swchannel/registration/internet/registration.cfm?SWAPPID=91&amp;RegPageID=350200&amp;SWTHEMEID=12949&amp;traffictype=Direct" target="_blank">survey conducted by Cisco</a>, 90 percent of American employees use their personal smartphone for work purposes. While this is an opportunity for businesses, it also adds risk, as these devices may have access to sensitive company information and there is little, if any, visibility into how security is managed for them.</p>
<p>GFI LanGuard now allows network administrators to see when and what devices connect to the Microsoft Exchange servers and it checks these devices for security vulnerabilities. Android®, iOS® and Windows Phone® are supported. Additionally GFI LanGuard will report when new mobile operating systems updates are available and makes it very easy for network administrators to send email notifications to device owners alerting them that these updates are available.</p>
<h2><b>Q: How does vulnerability assessment for mobile devices work? Do network administrators need to install anything on the smartphones?</b></h2>
<p>No. Auditing of smartphones and tablets using GFI LanGuard is very easy. Mobile devices that connect to the company’s Microsoft Exchange servers are detected using agent-less scans. There is nothing to install on smartphones, tablets or the Microsoft Exchange server.</p>
<p>The only thing that needs to be set is the Microsoft Exchange server name and credentials that have access to it.</p>
<h2><b>Q: Are there any enhancements on the patch management side?</b></h2>
<p>Yes. We are continuously improving our patch management capabilities. GFI LanGuard 2014 comes with patch management support for major Linux distributions such as Red Hat Enterprise Linux, Ubuntu, Suse, OpenSuse, CentOS and Debian.</p>
<p>According to <a href="http://whitepapers.theregister.co.uk/paper/view/2932/the-end-user-security-jigsaw.pdf" target="_blank">a recent survey from Freeform Dynamics Ltd</a> on 977 IT and business professionals representing a range of organization sizes and industries, 62.6% of them have at least one Linux system in their organization.</p>
<p>Now customers can use GFI LanGuard as a central console to patch Windows, Mac OS and Linux operating systems and applications. And, speaking of applications, it is now easier than ever for IT administrators to keep their systems fully patched, as we added a host of third-party applications to our “supported list”.</p>
<h2><b>Q: What new third party applications are supported?</b></h2>
<p>We added support for more than 20 new applications, bringing the total to over 50 third-party applications (besides Microsoft applications). We are practically covering all the most important ones in terms of popularity and security relevance.</p>
<p>Among the new applications we support are Pidgin (instant messaging), CDBurnerXP, ImgBurn and CCleaner (utilities), VLC and Audacity (media), LibreOffice (documents), Paint.NET and  IrfanView (imaging), Adobe Illustrator, Adobe PhotoShop and Adobe InDesign (Adobe Creative Suite), WinSCP and Core FTP (FTP clients), Python and Notepad++ (developer tools). The complete list is available <a href="http://www.gfi.com/support/products/gfi-languard/KBID003469" target="_blank">here</a>.</p>
<p>We will continue to add support for new applications at a high rate. Customers can request support for additional applications by sending an email <a href="mailto:FeedbackLNSS@gfi.com" target="_blank">to this address</a>.</p>
<h2><b>Q: Anything else worth mentioning?</b></h2>
<p>Yes, we have some other good news for our customers. We have a special offer for anyone who purchases or upgrades their GFI LanGuard version to 2014. They will automatically receive 25% extra nodes for free to use exclusively on mobile devices auditing.</p>
<p><em><strong>So check out the new <a href="http://www.gfi.com/land/Home/adv/lanss/Scan-your-network-effortlessly?adv=13558&amp;loc=49" target="_blank">GFI LanGuard</a> version. We are proud of what we have accomplished and we believe that our users will enjoy it too.</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/are-you-ready-for-2014-gfi-languard-2014-is/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>The Latest News from the GFI Cloud Team</title>
		<link>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-latest-news-from-the-gfi-cloud-team</link>
		<comments>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/#comments</comments>
		<pubDate>Thu, 29 Aug 2013 14:13:53 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[asset tracking]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[IT Management]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10799</guid>
		<description><![CDATA[Jackie Wake, product marketing manager for GFI Cloud, shares more news of the latest version released today. Q: Tell us about the latest release of GFI Cloud? Today’s release gives new focus to Asset Tracking, a FREE service in GFI &#8230;]]></description>
				<content:encoded><![CDATA[<p><i>Jackie Wake, product marketing manager for GFI Cloud, shares more news of the latest version released today.</i></p>
<div id="attachment_10800" class="wp-caption alignright" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/jackie-wake-gfi.jpg"><img class="size-full wp-image-10800" alt="Jackie Wake, Product Marketing Manager for GFI Cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/jackie-wake-gfi.jpg" width="300" height="225" /></a><p class="wp-caption-text">Jackie Wake, Product Marketing Manager for GFI Cloud</p></div>
<h3><b>Q: Tell us about the latest release of GFI Cloud?</b></h3>
<p>Today’s release gives new focus to <b>Asset Tracking, a FREE service in GFI Cloud</b>. Where IT admins could already track an unlimited number of devices, simply and easily in the web-based console, this release looks to enhance the user experience further and make deployment even easier.</p>
<h3><b>Q: So what’s new?</b></h3>
<p>Now you can see at a glance <b>inventory information across an entire network</b>, such as operating system, processor and RAM. This means you can quickly identify underperforming PCs and computers that need to be replaced sooner than others, by filtering and sorting your network in <b>one central view</b>.</p>
<p>When the GFI Cloud agent is installed, the console now shows<b> hardware and software details in minutes</b> and new users can get <b>up to speed quickly with in-product guidance</b> on what asset tracking information is available and where it can be found.</p>
<p>Most importantly <b>Asset Tracking can be deployed, without having to trial other GFI Cloud services</b>, such as Antivirus, Monitoring or Patch Management.  At the same time, these <b>services are just one click away in </b><b>the same centralized console</b>.  So they can be quickly and easily deployed when they are needed, without having to physically re-visit any of the tracked computers.</p>
<h3><b>Q: Why do I need it?</b></h3>
<p>As an IT admin or manager, knowing what hardware and software you have is the first step to being in control of your network.  It saves time on support calls and makes life easier when you’re planning hardware refreshes and software upgrades.</p>
<p>With Asset Tracking in GFI Cloud you can see what you have at a glance, anytime from anywhere and it won’t cost you a penny… EVER!</p>
<p>The catch?  No catch, just easy to use free asset tracking forever… Simple.</p>
<h3><b>Q: Where can I check it out?</b></h3>
<p>You can get <a href="http://www.gficloud.com/land/asset-tracking-b/?adv=13558&amp;loc=54">Asset Tracking FREE today</a> and roll it out to all your devices to see for yourself how easy it is to keep track of your company’s IT asset inventory, with GFI Cloud.</p>
<p><b><i>Do you want to learn more about this product? </i></b><a href="http://www.gficloud.com/asset-tracking/?adv=13558&amp;loc=54"><b><i>Visit our website</i></b></a><b><i> to find how GFI Cloud simplifies IT management with one central view of antivirus, workstation and server monitoring, patch management and FREE asset tracking across all your servers, PCs and laptops on the move!</i></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-latest-news-from-the-gfi-cloud-team/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers Find the Internet a Target-Rich Environment Thanks to Poor Patch Management</title>
		<link>http://www.gfi.com/blog/hackers-find-the-internet-a-target-rich-environment-thanks-to-poor-patch-management/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-find-the-internet-a-target-rich-environment-thanks-to-poor-patch-management</link>
		<comments>http://www.gfi.com/blog/hackers-find-the-internet-a-target-rich-environment-thanks-to-poor-patch-management/#comments</comments>
		<pubDate>Fri, 23 Aug 2013 15:38:58 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Legacy Systems]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patch management software]]></category>
		<category><![CDATA[Remote workstations]]></category>
		<category><![CDATA[vulnerability scanners]]></category>
		<category><![CDATA[vulnerability scanning]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10793</guid>
		<description><![CDATA[You would think that with things like automatic updates, applications that can automatically patch themselves, and the constant media attention towards security, hackers would be a dying breed, bereft of targets which they can exploit. Unfortunately, poor patch management practices &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/08/hackers-poor-patch-management.jpg"><img class="alignright  wp-image-10794" style="border: 0px solid black; margin: 10px;" alt="hackers-poor-patch-management" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/hackers-poor-patch-management.jpg" width="140" height="140" /></a>You would think that with things like automatic updates, applications that can automatically patch themselves, and the constant media attention towards security, hackers would be a dying breed, bereft of targets which they can exploit. Unfortunately, poor patch management practices across the board means that the ever-growing number of connected devices are providing hackers with and endless supply of fresh victims.<span id="more-10793"></span></p>
<h2>Mobile Devices</h2>
<p>The rampant growth of smartphones provides hackers plenty of opportunity to find victims. Whether a system is running Android, iOS, Windows Phone, or BlackBerry, updating the operating systems is typically handled by the carrier, with little to no capability for the device owner to manage updates themselves, whether the owner is a consumer or an enterprise. And while the mobile platforms all do a good job of checking for updates to installed applications, it is often up to the user to actually deploy those updates, so it is not unusual to find a mobile device in need of multiple updates at any point in time. MDM (Mobile Device Management) products can help with this, but they can also be costly to implement and maintain, and challenging to use when you also want to support BYOD (Bring Your Own Device) or multiple devices and platforms. Vulnerability scanning of mobile devices connecting to your network, whether on the internal Wi-Fi or to applications over the Internet, can help sys admins identify systems requiring remediation – reducing the risk to corporate data.</p>
<h2>CMS</h2>
<p>Almost everyone these days has a blog, and almost no one these days manages the underlying platform that hosts their blog. WordPress and Joomla together account for the Content Management System (CMS) running on thousands of systems hosting over a million websites. Typically, blog hosts will maintain the underlying operating system, but leave updating the CMS and plugins to the customer. And since both WordPress and Joomla make it very easy to ignore your blog hasn’t been backed-up for weeks while you’re still publishing content daily, it’s very easy for a CMS to quickly fall out of spec. Since many vulnerabilities can be identified by certain basic strings, an attacker can find a new victim to exploit faster than they can order a pizza online. These CMS platforms can end up hosting spam links or malware that can then spread to site visitors. Vulnerability scanning and patching plugins should be a default addition to all sites, and CMS vendors should offer an option to automatically update for users who have “more important” things to do than check their blogs for updates.</p>
<h2>BYOD</h2>
<p>Bring Your Own Device initiatives are cropping up in every industry and market segment. As users want to use their platform of choice, enterprises are looking at ways to secure their infrastructure and data, while leaving BYOD device patching to the Y’s in the acronym. Unfortunately that is a short sighted approach, since compromised devices can be used to steal credential that can then be used to access more traditional systems, or to intercept data as it is accessed by the BYOD device. As with mobile devices, vulnerability scanners should be used regularly by enterprises, and IT should take a proactive role in helping users to secure and maintain their own devices. You can spend time helping a user update their tablet, or you can spend time recovering from a data breach caused by a device that has not been updated for some time. The choice is yours.</p>
<h2>Remote Workstations</h2>
<p>As good as most enterprises are at securing and updating their workstations and servers that are on the corporate network, most are abysmally bad at addressing machines belonging to remote users. It’s not uncommon to hear about <i>annual</i> meetings where everyone is required to bring in their laptop so IT can update and patch it. <i>ANNUALLY???</i> With new vulnerabilities being discovered daily, I would rather just start with formatting a drive on a machine that hasn’t been cared for in almost a year, as it would be faster and more reliable to just flatten it than to try and clean it. Remote devices need attention too, and companies must leverage distributed systems, agents, or automatic updates to help ensure these devices stay secure. Rather than leaving things to chance, deploy a patch management system that can handle remote devices, or <i>require</i> that remote users connect to VPN regularly in order for their devices to receive updates and be scanned for vulnerabilities.</p>
<h2>Legacy Systems</h2>
<p>Legacy systems are the worst of the lot, as vendors have probably declared these systems to be end of life, and no longer offer updates to secure vulnerabilities. Many may have vulnerabilities for which patches were released, but because they come from an earlier time, were not updated as they should have been, and the patches are no longer readily available. Attackers regularly find ways to compromise networks and systems by first gaining a foothold on a legacy system. Companies must plan for replacing systems before they become obsolete, or sandbox them to restrict access and reduce the chance of compromise.</p>
<h2>Call to action</h2>
<p>There are several things that must be done to reduce the threat to users, data and systems. The responsibilities must be shared by enterprises, vendors, and end users alike. Securing data is not enough; platforms and devices must be secured as well. Companies should ensure that all devices within their reach are secure, whether owned by the company or by the end user. Vendors of mobile devices need to be sure they deploy security updates immediately, rather than waiting until they are ready to push out a major refresh to phones on their network. Apps should either automatically update, or reduce functionality until the user updates them, and systems that are not well managed, like CMS platforms and remote users’ workstations, should by default automatically update.</p>
<p>To better ensure administrators are aware of their exposure, they should regularly run security vulnerability scans against anything on their network. <a href="http://www.gfi.com/land/Home/adv/lanss/Scan-your-network-effortlessly?adv=13558&amp;loc=49 " target="_blank">Patch management software</a> can update and report on all systems within their administrative control, and should be a mandatory part of any infrastructure.</p>
<p>And non-technical end users must take active roles in securing their own devices. If they can buy them, power them on, and connect them to the Internet, then they can check for and install updates as long as vendor build in obvious and easy to use tools. Call it security’s easy button.</p>
<p>Securing systems is in everyone’s best interest. Do your part, and encourage others to do theirs.</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/hackers-find-the-internet-a-target-rich-environment-thanks-to-poor-patch-management/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tried and Liked Our Products? It’s Time to Vote for Them!</title>
		<link>http://www.gfi.com/blog/tried-and-liked-our-products-its-time-to-vote-for-them/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tried-and-liked-our-products-its-time-to-vote-for-them</link>
		<comments>http://www.gfi.com/blog/tried-and-liked-our-products-its-time-to-vote-for-them/#comments</comments>
		<pubDate>Tue, 20 Aug 2013 12:34:41 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[GFI World]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[GFI]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[GFI LANguard]]></category>
		<category><![CDATA[GFI MailArchiver]]></category>
		<category><![CDATA[GFI MailEssentials]]></category>
		<category><![CDATA[GFI Max Backup]]></category>
		<category><![CDATA[GFI MAX MailProtection]]></category>
		<category><![CDATA[GFI MAX RemoteManagement]]></category>
		<category><![CDATA[GFI WebMonitor]]></category>
		<category><![CDATA[Monitis]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows IT Community Pro Awards]]></category>
		<category><![CDATA[WindowsITPro]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10778</guid>
		<description><![CDATA[We’re very excited to see some of our products have been nominated for the Windows IT Community Pro Awards as follows: 1.            Best Auditing &#38; Compliance Product – GFI MailArchiver® 2.            Best Backup &#38; Recovery Product – GFI IASO and &#8230;]]></description>
				<content:encoded><![CDATA[<p>We’re very excited to see some of our products have been nominated for the <a href="http://www.surveymonkey.com/s/2013-CommChoice-WinITPro-FinalVoting" target="_blank">Windows IT Community Pro Awards</a> as follows:<span id="more-10778"></span></p>
<p>1.            Best Auditing &amp; Compliance Product – <a href="http://www.gfi.com/products-and-solutions/email-and-messaging-solutions/gfi-mailarchiver" target="_blank">GFI MailArchiver®</a></p>
<p>2.            Best Backup &amp; Recovery Product – GFI IASO and <a href="http://www.gfimax.com/backup-solutions" target="_blank">GFI Max Backup™</a></p>
<p>3.            Best Cloud Computing Product or Service – <a href="https://www.gficloud.com/land/gfi-cloud-unified?adv=13558&amp;loc=53 " target="_blank">GFI Cloud™</a></p>
<p>4.            Best Messaging Product &#8211; <a href="http://www.gfi.com/products-and-solutions/email-and-messaging-solutions/gfi-mailessentials" target="_blank">GFI MailEssentials®</a> and <a href="http://www.gfimax.com/mail/mail-protection" target="_blank">GFI Max MailProtection™</a></p>
<p>5.            Best Network Management Product – <a href="http://www.gfimax.com/remote-management" target="_blank">GFI Max RemoteManagement™</a></p>
<p>6.            Best Patch Management Product – <a href="http://www.gfi.com/land/Home/adv/lanss/Scan-your-network-effortlessly?adv=13558&amp;loc=49 " target="_blank">GFI LanGuard®</a></p>
<p>7.            Best Security Product &#8211; GFI LanGuard and <a href="http://www.gfi.com/land/Home/adv/webmon/Get-advanced-web-filtering-for-your-business?adv=13558&amp;loc=50" target="_blank">GFI WebMonitor®</a></p>
<p>8.            Best Systems Monitoring Product – <a href="http://www.monitis.com/" target="_blank">Monitis™</a></p>
<p>If you like our products, vote for them today!</p>
<p style="text-align: center;"><a href="http://www.surveymonkey.com/s/2013-CommChoice-WinITPro-FinalVoting"><img class="wp-image-10785 aligncenter" style="border: 0px solid black; margin-top: 10px; margin-bottom: 10px;" alt="WindowsITPro2" src="http://www.gfi.com/blog/wp-content/uploads/2013/08/WindowsITPro2.png" width="264" height="101" /></a></p>
<p><span style="text-decoration: underline;"><b>How to vote:</b> </span>Visit the <a href="http://www.surveymonkey.com/s/2013-CommChoice-WinITPro-FinalVoting" target="_blank">nominations page</a>; here you will find the online voting form; vote for each of the products you&#8217;ve used and would recommend to others – it’s that simple!</p>
<p><span style="text-decoration: underline;"><b>Why your vote means so much to us:</b> </span>The Windows IT Community Pro Awards allow the tech community to determine what products deserve acclaim and recognition. As a company with the vision of being the recognized software leader for small to mid-sized businesses, being chosen for these awards means a lot to us!</p>
<p>Your vote matters!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/tried-and-liked-our-products-its-time-to-vote-for-them/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Happy SysAdmin Day! We’re giving away GFI Superhero T-shirts</title>
		<link>http://www.gfi.com/blog/happy-sysadminday-we-are-giving-away-gfi-superhero-tshirts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=happy-sysadminday-we-are-giving-away-gfi-superhero-tshirts</link>
		<comments>http://www.gfi.com/blog/happy-sysadminday-we-are-giving-away-gfi-superhero-tshirts/#comments</comments>
		<pubDate>Fri, 26 Jul 2013 11:18:18 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[GFI World]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[free t-shirt]]></category>
		<category><![CDATA[gfi superhero]]></category>
		<category><![CDATA[Sys Admins]]></category>
		<category><![CDATA[sysadminday]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10730</guid>
		<description><![CDATA[Surprise, surprise! All the GFI sys admins started SysAdmin Day on a well-deserved happy note as the offices gave them a GFI Superhero T-shirt each.  Here’s a collage of the few who weren’t camera-shy: And we’re not stopping there. Knowing &#8230;]]></description>
				<content:encoded><![CDATA[<p>Surprise, surprise! All the GFI sys admins started SysAdmin Day on a well-deserved happy note as the offices gave them a GFI Superhero T-shirt each.  Here’s a collage of the few who weren’t camera-shy:<span id="more-10730"></span></p>
<p style="text-align: center;"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Sys-Admin-Day5.jpg"><img class="aligncenter  wp-image-10731" alt="Sys Admin Day5" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Sys-Admin-Day5.jpg" width="506" height="242" /></a></p>
<p>And we’re not stopping there. Knowing most of our followers are sys admins we thought of ordering another <del>50</del> 150 GFI Superhero T-shirts… That’s right, you can celebrate with us and get your own free T-shirt!</p>
<p><b>Here’s how:</b></p>
<p>It’s really simple. We’re giving away a GFI Superhero T-shirt (like the ones in the picture) to the first <del>50</del> 150 sys admins who participate in our competition – all you need to do is <a href="https://gfi.wufoo.com/forms/gfi-sys-admin-day-competition/">complete this form</a>!</p>
<p><b>Dates:</b></p>
<p><del>Registration opens now and we will update this blog post when we’ve received 50 complete forms.</del> We have reached 150 requests so we closed the competition. A blog post will follow up in a few weeks!</p>
<p><b>The all-important small print:</b></p>
<p>Before you do that though, be sure to read our <i>Terms and conditions</i> – it’s very important that you follow these, as you could be disqualified if any of these rules are infringed. Having said that, good luck to all and…</p>
<h2 align="center"><b>HAPPY SYSADMIN DAY!</b><b> </b></h2>
<p><b>Terms and conditions:</b></p>
<ul>
<li>The first <del>50</del> 150 complete forms will each win a GFI Superhero T-shirt (as shown in image above)</li>
<li>GFI Software employees and their families cannot participate in this competition</li>
<li>All entrants must be sys admins; non sys admins will not be considered for the prize</li>
<li>Winners will be notified by email</li>
<li>GFI is not responsible for the timeliness of the prize dispatch T-shirts are available in Small, Medium, Large, X-Large and XX-Large</li>
<li>Upon contacting the winner/s, if no reply is received within a week (7 days), GFI retains the right to choose another entry</li>
<li>Whilst GFI does its utmost to ensure that all prizes are delivered in a timely fashion the company does not retain responsibility for any prizes that are lost/stolen in the mail</li>
<li>Any incomplete or irrelevant entries or entries that do not comply with these <i>Terms and conditions </i>will not be eligible to win</li>
<li>Prizes are as described and cannot be substituted for cash.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/happy-sysadminday-we-are-giving-away-gfi-superhero-tshirts/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>26 Ways to Say &#8216;Happy SysAdmin Day!&#8217;</title>
		<link>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=26-ways-to-say-happy-sysadmin-day</link>
		<comments>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/#comments</comments>
		<pubDate>Thu, 25 Jul 2013 12:37:53 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[July 26]]></category>
		<category><![CDATA[Sys admin]]></category>
		<category><![CDATA[sys admin gift]]></category>
		<category><![CDATA[SysAdmin Day]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10725</guid>
		<description><![CDATA[Around the world and across the Internet, July 26 is known as SysAdmin Day. For 14 years, the last Friday in July has been set aside as a way for users to show a little appreciation for the SysAdmins that &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday4.jpg"><img class=" wp-image-10726 alignright" style="border: 0px solid black; margin: 10px;" alt="FBSysAdminWeekday4" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday4-300x300.jpg" width="240" height="240" /></a>Around the world and across the Internet, July 26 is known as SysAdmin Day. For 14 years, the last Friday in July has been set aside as a way for users to show a little appreciation for the SysAdmins that keep their systems running, their email free of spam, and their ability to Like comments intact. Consider that your own SysAdmins deserve a little show of appreciation.</p>
<p>To say “thank you”, here’s a list of 26 simple ways you can show your appreciation for those unsung heroes that toil away to keep the servers humming and the tubes unclogged. Some of these are low cost gestures; others might be something the boss should cover or the office should take up a collection, but all are guaranteed to put a smile on the face of that favourite SysAdmin of yours, on the one day a year where you know better than to drop a broken machine off or open a last minute helpdesk ticket.<span id="more-10725"></span></p>
<h2>1.      A card</h2>
<p>When you care enough to send the very best, but you don’t have a lot of money to invest, a nice card at least shows some thought. Just make sure it is a card themed around IT, general geekiness, or otherwise shows that you didn’t pull one out of a card drawer because you forgot about it.</p>
<h2>2.      Coffee shop gift cards</h2>
<p>Whether your SysAdmin’s favourite brew comes from Starbucks or the local shop down the street, a gift card is the gift that keeps on giving, or at least for a couple of cups of really good Joe.</p>
<h2>3.      Mobile store gift cards</h2>
<p>If coffee isn’t their thing, you can bet a gift card to the iTunes Store, Google Marketplace, or Windows Store will be appreciated. Find out what kind of phone they have and get the card to right shop and you can bet that by the end of the day they will have a couple of new apps to try out.</p>
<h2>4.      Amazon gift cards</h2>
<p>While this may be the fallback of last resort, even people ten years in the grave can find <i>something</i> at Amazon that they want.</p>
<h2>5.      Lunch</h2>
<p>You’d be amazed at how far a nice lunch can go towards saying thank you, especially since that SysAdmin usually eats lunch at their desk because there is so much work to do. Whether it’s a one on one affair, or you make it a team event, just providing them the opportunity and excuse to see the sun at least for one day a year is a great gesture to make.</p>
<h2>6.      Dinner</h2>
<p>Better still, buy your SysAdmin dinner, by getting him or her a gift card at a nice restaurant so they can take their significant other out for a nice meal. Remember, every time you call your SysAdmin after hours to fix something, you are impacting their family too. <i>Thank You</i>s should extend to them as well.</p>
<h2>7.      A red Swingline stapler</h2>
<p>The icon of geek and snarkiness, the <a href="http://www.thinkgeek.com/product/61b7/?srp=6">Red Swingline Stapler</a> is something every SysAdmin will love.</p>
<h2>8.      TV Show or movie-themed swag</h2>
<p>With a simple conversation, you can quickly find out what your SysAdmin’s favourite sci-fi TV show or movie is, and then a quick visit to ThinkGeek will provide you with tons of options for low cost, but very cool, thank you gifts. Very few adults will ever buy themselves a Sonic Screwdriver, but secretly, we <i>all </i> want one!</p>
<h2>9.      Poster</h2>
<p>Use the same recon skills as above, but this time visit Amazon for cool movie posters or other theme art so your SysAdmin can pimp their cube in style.</p>
<h2>10. A Pizza party</h2>
<p>Here’s one the whole office can enjoy, and EVERYONE loves pizza. And since SysAdmin’s day is on a Friday, it’s a perfect fit for the day.</p>
<h2>11. Light Dims LED Light Blocker</h2>
<p>These cool little stickers dim otherwise overly bright lights, and can be applied to TVs, monitors, UPS systems, alarm clocks, or any other status light that needs to be seen, but is just a bit too blinding for most. Check them out at: <a href="http://www.thinkgeek.com/product/eeb6/?srp=1">http://www.thinkgeek.com/product/eeb6/?srp=1</a></p>
<h2>12. Hacking putty</h2>
<p>Part silly putty, part play-dough, part caulk, and completely awesome &#8211; <a href="http://www.thinkgeek.com/product/e976/?pfm=Search&amp;t=hacking%20putty">Hacking Putty</a> can be used to fix or enhance almost anything.</p>
<h2>13. Star Trek TOS Phaser Laser Pointer</h2>
<p>Anyone who needs to demonstrate or point out anything needs a laser pointer, and every SysAdmin has pretended that they had a phaser when they were using one. Here’s a gift that says thank you with a nod to having fun: http://www.thinkgeek.com/product/1124/?srp=2</p>
<h2>14. Zombies are in</h2>
<p>Did you know that Zombies are “in” right now? Anything from the Walking Dead to World War Z to remakes of George Romero movies are selling like mad right now, and thank you gifts that play into this will bring a smile and a chuckle to any SysAdmin’s face.</p>
<h2>15. Powerstrip with USB</h2>
<p>Every single person that sees one of these in action wants one. Get on your SysAdmin’s special list with this as a thank you: http://www.amazon.com/Outlets-To-Power-Strip-USB/dp/B0018MEBNG/ref=sr_1_4?ie=UTF8&amp;qid=1374538925&amp;sr=8-4&amp;keywords=power+strip+usb</p>
<h2>16. Bawls</h2>
<p>Long hours mean a need for caffeine and sometimes coffee just won’t cut it. A case of <a href="http://www.amazon.com/Bawls-Guarana-Case-24-Bottles/dp/B001KJK2PI/ref=sr_1_cc_2?s=aps&amp;ie=UTF8&amp;qid=1374538955&amp;sr=1-2-catcorr&amp;keywords=bawls">Bawls</a> is a delicious and refreshing way to hold of sleepiness during those late night changes.</p>
<h2>17. Caffeinated mints</h2>
<p>And these can not only fight off fatigue, but bad breath as well. It’s a multitasker, and any SysAdmin will appreciate that!</p>
<h2>18. Herbal Tea collection</h2>
<p>Of course, too much caffeine can be a bad thing. Many SysAdmins have discovered the benefits and the deliciousness of a good cuppa, and herbal teas can help you relax without hyping you up. Show your SysAdmin you care without feeding their addiction.</p>
<h2>19. Emergency battery</h2>
<p>Everyone needs more power, and when your cell phone is dying, nothing is more helpful than some emergency power. USB batteries come in a variety of sizes and capacities, and can save the day time and again.</p>
<h2>20. A really cool coffee mug</h2>
<p>Can you tell coffee is a big deal to SysAdmins. A cool coffee mug makes a statement, and can also handle those herbal teas. Look for one that plays to the TV or movie tie in for bonus points.</p>
<h2>21. Anything by Neil Stephenson</h2>
<p>A SysAdmin’s folk hero, anything that Neil Stephenson was involved in creating will be a greatly appreciated gesture, and you will go up at least five points in the recipient’s opinion.</p>
<h2>22. Like/Dislike stamp set</h2>
<p>Even SysAdmins who aren’t on Facebook will love these. I bet they will even use them on their TPS reports: http://www.thinkgeek.com/product/e5f5/</p>
<h2>23. Cable organizers set</h2>
<p>Velcro is so over. The new hotness is cable organization using silicone polymers and oddly-shaped, brightly colored widgets to keep cables in place, bound together, or otherwise organized.</p>
<h2>24. Paracord survival bracelet</h2>
<p>Everyone wants one… but many people think they will look silly if they buy one for themselves. Help your SysAdmin get past that mental block. If disaster ever strikes, you know they will know how to McGyver something out of the bracelet to save you all – or at least, your email.</p>
<h2>25. Beer</h2>
<p>Free speech, free beer, it’s all good. Find out their favorite and get them a case. It’s the kind of gift that says…you work your #$(&amp; off, thanks, now have a cold one!</p>
<h2>26. Programmable LED light</h2>
<p>The last on our list has no practical value, which is one reason no SysAdmin will ever buy it for themselves… but they are so cool! Replacing their desk lamp with this bulb will add new factors to coolness, and help them stay awake during those interminable conference calls: <a href="http://www.amazon.com/HitLights-BlueLux-Changing-Quality-Feature/dp/B005SHR2C4/ref=cm_cr_dp_asin_lnk">http://www.amazon.com/HitLights-BlueLux-Changing-Quality-Feature/dp/B005SHR2C4/ref=cm_cr_dp_asin_lnk</a></p>
<p>Twenty-six ways to say thank you to a SysAdmin that toils indefatigably for you 24/7/365. It’s one day a year that you get to really show your gratitude to them, so pick one from the list above, and remember your SysAdmin this Friday!</p>
<p><em><strong>Like our posts? Subscribe to our <a href="http://feeds.feedburner.com/TalkTechToMe-All">RSS feed</a> or email feed (on the right hand side) now, and be the first to get them!</strong></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/26-ways-to-say-happy-sysadmin-day/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>SysAdmin Day: We’re Taking it to Another Level!</title>
		<link>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sysadmin-day-were-taking-it-to-another-level</link>
		<comments>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/#comments</comments>
		<pubDate>Mon, 22 Jul 2013 13:56:42 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[free tools]]></category>
		<category><![CDATA[Sys admin]]></category>
		<category><![CDATA[SysAdmin Day]]></category>
		<category><![CDATA[SysAdmin Week]]></category>
		<category><![CDATA[TalkTechToMe]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10673</guid>
		<description><![CDATA[In case it wasn’t clear enough last year, we love sys admins and SysAdmin Day is very important to us. So we decided to turn SysAdmin Day into SysAdmin Week – because one day is really not enough! Throughout this week, &#8230;]]></description>
				<content:encoded><![CDATA[<p><a style="color: #ff4b33; line-height: 24px; font-size: 16px;" href="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday1.jpg"><img class=" wp-image-10674 alignright" style="margin: 10px; border: 0px solid black;" alt="SysAdminWeekday1" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/FBSysAdminWeekday1-300x300.jpg" width="240" height="240" /></a></p>
<p>In case it wasn’t clear enough <a href="http://www.gfi.com/blog/47-reasons-to-thank-a-sysadmin/">last year</a>, we love sys admins and SysAdmin Day is very important to us.</p>
<p>So we decided to turn SysAdmin Day into SysAdmin Week – because one day is really not enough! Throughout this week, we’ll be publishing a daily post designed specifically for you – from free tools, to tips, tricks of the trade and more (but we can’t divulge any secrets yet).</p>
<p>Stay tuned on our social media pages and TalkTechToMe!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/sysadmin-day-were-taking-it-to-another-level/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The Latest News from the GFI Cloud Team</title>
		<link>http://www.gfi.com/blog/the-latest-news-from-gfi-cloud-team/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-latest-news-from-gfi-cloud-team</link>
		<comments>http://www.gfi.com/blog/the-latest-news-from-gfi-cloud-team/#comments</comments>
		<pubDate>Thu, 18 Jul 2013 14:18:09 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[GFI World]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[antivirus protection]]></category>
		<category><![CDATA[antivirus threats]]></category>
		<category><![CDATA[asset tracking]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[GFI Cloud]]></category>
		<category><![CDATA[missing patches]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[patches]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10670</guid>
		<description><![CDATA[Jackie Wake, product marketing manager for GFI Cloud, is back with exciting news about more features in the latest version released today. Q: Tell us about the latest release of GFI Cloud? Today’s release launches a new area in GFI &#8230;]]></description>
				<content:encoded><![CDATA[<div id="attachment_10535" class="wp-caption alignright" style="width: 310px"><a href="http://www.gfi.com/blog/wp-content/uploads/2013/05/Jackie_at_desk_May2013.jpg"><img class="size-medium wp-image-10535 " alt="Jackie Wake, Product Marketing Manager for GFI Cloud" src="http://www.gfi.com/blog/wp-content/uploads/2013/05/Jackie_at_desk_May2013-300x225.jpg" width="300" height="225" /></a><p class="wp-caption-text">Jackie Wake, Product Marketing Manager for GFI Cloud</p></div>
<p><i>Jackie Wake, product marketing manager for GFI Cloud, is back with exciting news about more features in the latest version released today.<span id="more-10670"></span></i></p>
<h2>Q: Tell us about the latest release of GFI Cloud?<b><i></i></b></h2>
<p>Today’s release launches a new area in GFI Cloud for <b>reports.  </b>From the same centralized console accessible at <a href="http://www.gficloud.com/">www.gficloud.com</a>, IT administrators can now generate reports for GFI Cloud’s services for antivirus, patch management and asset tracking.</p>
<h2>Q: What reports are included?</h2>
<p>These are the reports that have been most<b> requested by our customer base; </b>they enable IT admins to:</p>
<ul>
<li>See at a glance the <b>current status of antivirus protection</b> in their business and show the value of the service being delivered by IT.</li>
</ul>
<ul>
<li>Easily spot and analyze <b>trends in antivirus threats to their network</b>, such as the top threats detected or computers which are at most risk<b>; </b>so they can take preventative actions and improve security.</li>
</ul>
<ul>
<li>Spot and analyze <b>trends in missing patches</b>, so they can take action and address areas where they are particularly vulnerable.</li>
</ul>
<ul>
<li>Generate a <b>detailed inventory list</b> to know what is on their network, with easy reference to key asset information, such as IP and MAC addresses.  Identifying devices with outdated operating systems is as simple as running a report with GFI Cloud.</li>
</ul>
<h2>Q: Why do I need reports in GFI Cloud?</h2>
<p>If done well, much of the work of a smooth-running IT department can be invisible to the business; as far as they can see their environment ‘has no problems that need fixing’.  Instead of feeling fantastic about the health and performance of their environment questions, the value IT is providing to the business could be questioned.</p>
<p>Reporting in GFI Cloud is useful to the IT department, in terms of better decision-making, and to the company because it can provide insight, in a structured and digestible format, on the work IT does.  In no time, management can start to recognize that ‘everything working’ and ‘staff being consistently productive’ is a result of the IT department’s true value and work – and use of technology.</p>
<p>You can now report on the activities and state of the servers, workstations and laptops you manage, if you work from the office, from home or even in a remote location.</p>
<p>With quick and easy access to key reports for antivirus, patch management and asset tracking, you have the management information you need to help improve network security, run IT more efficiently and effectively and, why not, get some well-deserved kudos for you and your team.</p>
<h2>Q: Any other reports planned?</h2>
<p>Yes &#8211; this is just the beginning… There has been a strong demand by our subscriber base that GFI Cloud gives them the ability to generate reports. We will be adding more reports to each new release of GFI Cloud, and as we continue to understand what reports are of most value to our customers and their organization.</p>
<p>We are delivering the top reports requested by customers in this release and will add even more on a regular basis, in small batches.</p>
<p>Customers can tell us what reports they’d like to see in GFI Cloud by giving us feedback directly using the Feedback button on the upper right section in the GFI cloud web console.</p>
<h2>Q: Anything else of note in this release?</h2>
<p>Yes. Monitoring in GFI Cloud is enhanced with the addition of a <b>new event log check </b>detecting and alerting on conditions set by you.  Highly configurable, this enables you to <b>monitor and manage the health of key business applications</b>, to keep them running efficiently<b>.</b></p>
<p>We’ve also made the installation of GFI Cloud’s Antivirus even simpler and cleaner, with a<b> smoother transition when a pre-installed AV is removed</b>. We’ve made it quicker and easier to deploy the GFI Cloud agent with <b>proxy details as part of the MSI installer</b>.</p>
<h2>Q: Where can I check it out?<b><i></i></b></h2>
<p>You can start a <a href="http://www.gficloud.com/land/gfi-cloud-unified/?adv=13558&amp;loc=41">free 30-day trial of GFI Cloud</a> today and see for yourself how easy it is to manage your company’s IT, with one place to monitor and protect your IT network, wherever you are.  Watch our <a href="http://youtu.be/FALGzP9HJio">short video</a> for a round-up of some of the great features added to GFI Cloud this year.</p>
<p><strong><i>Do you want to learn more about this product? <a href="http://www.gficloud.com/?adv=13558&amp;loc=41">Visit our website</a></i><i> to find how GFI Cloud simplifies IT management with one centralized view of antivirus, workstation and server monitoring, patch management and asset tracking across all your servers, PCs and laptops on the move!</i></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/the-latest-news-from-gfi-cloud-team/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When Good Devices Go Bad</title>
		<link>http://www.gfi.com/blog/when-good-devices-go-bad/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=when-good-devices-go-bad</link>
		<comments>http://www.gfi.com/blog/when-good-devices-go-bad/#comments</comments>
		<pubDate>Thu, 11 Jul 2013 14:00:28 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[data loss]]></category>
		<category><![CDATA[data-loss prevention]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Endpoint security solutions]]></category>
		<category><![CDATA[GHS]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[USB flash drives]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10650</guid>
		<description><![CDATA[Unless you’ve been sleeping under a rock for the past month or so, you must have heard about the National Security Agency (NSA) contractor that allegedly leaked data from the NSA regarding surveillance programs being conducted by the agency. Edward &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/ESECPrime.jpg"><img class="alignright  wp-image-10651" style="border: 0px solid black; margin: 10px;" alt="Endpoint security" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/ESECPrime.jpg" width="269" height="184" /></a>Unless you’ve been sleeping under a rock for the past month or so, you must have heard about the National Security Agency (NSA) contractor that allegedly leaked data from the NSA regarding surveillance programs being conducted by the agency. Edward Snowden may be considered by some to be a hero, others to be a traitor, but what we can be sure of is that he was an authorized administrator who had access to confidential information, and he breached that trust. What you may have missed is how he did it.<span id="more-10650"></span></p>
<p>According to the <i>Los Angeles Times</i> citing anonymous sources familiar with the official investigation, Snowden used a USB drive to remove the data from the NSA. Apparently he simply made a copy of files to which he had access, and then just walked them out the door. While the NSA, like so many corporations today, has a policy against using USB drives, authorized administrators can use them when necessary. We all know that there are many tools available for download that work from USB, admins might use a thumb drive to apply firmware updates or to install new drivers, and any one of hundreds of other valid reasons for an admin to use such a flash drive. Apparently the NSA needs a little more than just a written policy. But they are far from alone in this.</p>
<p>According to a study by the Ponemon Institute published about two years ago that surveyed over 700 IT pros, 70% of businesses that lost sensitive or confidential data could attribute that loss in at least some fashion to the use of USB flash drives. While more than half were attributed to malware introduced onto systems from flash drives, 45% of the incidents came from lost, stolen, or misappropriated devices. Of the same study, while about half of the respondents indicated that their company had a policy regarding USB flash drives, less than half of those who do have technical means to enforce policy.</p>
<p>USB flash drives have also been implicated in security incidents at two US power plants last year. <a href="http://www.dailytech.com/Two+US+Power+Plants+Infected+With+USB+Malware+Last+Year/article29682.htm">ISC-CERT reported</a> that in two separate incidents, a USB flash drive containing malware was connected to a computer within a power plant, which then spread to other systems. In the more extreme case, the plant restart was delayed by almost three weeks as a result of the malware infection.</p>
<p>Earlier this year, <a href="https://www.privacyassociation.org/publications/2013_01_17_utah_health_usb_stick_lost_breach_costs_processor_94_million">a USB flash drive containing NPI for some 6000 citizens in Utah was lost</a>. While Social Security numbers were not included in the lost data, the State still needs to undertake measures to protect the affected individuals. This loss of data by a third party contractor comes on the heels of a previous breach that led to the resignation of the State’s CIO, and appears to portend serious legal issues for the contractor as the State plans to pursue “whatever financial or contractual remedies are available in order to ensure GHS [Gold Health Systems] is held accountable for this serious mistake.”</p>
<p>These anecdotes all have a common theme – USB flash drives are dangerous. While they are great tools in the right hands and used for the right purposes, the risks they present to critical systems and sensitive data cannot be ignored. A government’s secrets were made public. Critical infrastructure systems were compromised. Individuals’ personal information has been stolen. The risks outweigh the benefits of these devices, and permitting their unrestricted use is just too dangerous. Loss of data, serious downtime, legal actions, and loss of jobs are all common themes. Written policies are required, but do not go far enough to protect companies from the threats.</p>
<p>What companies need is endpoint security. There are a number of technical measures that endpoint security solutions can employ to protect businesses from the risks presented by USB flash drives, while still enabling their legitimate use. No one wants to completely ban them from any and all uses, considering how beneficial they can be. Endpoint security allows you to use USB drives, just in a safe and secure manner. Endpoint security solutions first and foremost can enforce encryption for all portable devices. That way, if a flash drive is ever lost or stolen, the data stored on the device is safe from prying eyes.</p>
<p>There’s far more to endpoint security than just encryption though. Endpoint security can log and audit all uses of portable media, and enforce data-loss prevention (DLP) measures that can scan data for things like Social Security numbers or credit card numbers to ensure that sensitive data is not moved to portable media, or that it can only be moved to secure media by authorized personnel. That way, just because a user can access the data on the network, they cannot transport that data away unless specifically allowed to do so. And if they are authorized, you have an audit log that tells you exactly what files were copied to the portable media.</p>
<p>Endpoint security can also provide real-time status monitoring of all the systems on your network, automatically enabling protection to new machines that join your domain.</p>
<p>Now that you are aware of, and no doubt very interested in, endpoint security, make sure you look at products that are compatible with all your operating systems, including Windows 8 and Server 2012, and that can apply policy based on your existing Active Directory so that you can leverage and protect your existing investments.</p>
<p>USB flash drives are extremely useful, valuable tools when used properly. <a href="http://www.gfi.com/products-and-solutions/network-security-solutions/gfi-endpointsecurity?adv=13558&amp;loc=40">Endpoint security solutions</a> can help to make sure that your written policies around the safe and secure use of these devices is enforced technically to keep your data safe, and your company off the front page news. Endpoint security is the right way to secure your company against the threats USB flash drives present, while still enabling you to use them.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/when-good-devices-go-bad/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Computing Security Awards 2013 Nominations Now Open!</title>
		<link>http://www.gfi.com/blog/computing-security-awards-2013-nominations-now-open/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=computing-security-awards-2013-nominations-now-open</link>
		<comments>http://www.gfi.com/blog/computing-security-awards-2013-nominations-now-open/#comments</comments>
		<pubDate>Fri, 05 Jul 2013 16:59:38 +0000</pubDate>
		<dc:creator>Christina Goggi</dc:creator>
				<category><![CDATA[GFI World]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[2013 Computing Security Awards]]></category>
		<category><![CDATA[Computing Security Awards]]></category>
		<category><![CDATA[Computing Security Awards 2013 Nominations]]></category>
		<category><![CDATA[Computing Security Awards Nominations]]></category>
		<category><![CDATA[GFI]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10632</guid>
		<description><![CDATA[The nominations for the 2013 Computing Security Awards are now open! Now in their fourth year, these awards are highly respected by end users and vendors, and honor vendors, like GFI®, for their efforts to provide products and solutions that &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/07/Computing-Security-Awards.jpg"><img class="alignright  wp-image-10633" style="border: 0px solid black; margin: 10px;" alt="Computing Security Awards" src="http://www.gfi.com/blog/wp-content/uploads/2013/07/Computing-Security-Awards-300x300.jpg" width="240" height="240" /></a>The nominations for the 2013 Computing Security Awards are now open!<span id="more-10632"></span></p>
<p>Now in their fourth year, these awards are highly respected by end users and vendors, and honor vendors, like GFI®, for their efforts to provide products and solutions that help companies combat IT security threats. Last year, GFI won two awards in recognition of our efforts to help small and mid-sized businesses improve their security – VIPRE® Business Premium™ was awarded the <em>Anti Malware Solution of the Year</em> and GFI Cloud™ the <em>New Product of the Year</em> award.</p>
<p>If you like our products visit <a href="http://www.computingsecurityawards.co.uk/">http://www.computingsecurityawards.co.uk/</a>, choose a relevant category and add your nomination.</p>
<p>We encourage you to nominate GFI and share the link to the nomination page with your colleagues.</p>
<p>Hurry up though, nominations close on 29 July!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/computing-security-awards-2013-nominations-now-open/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 20:41:34 by W3 Total Cache --